cve-2024-40941
Vulnerability from cvelistv5
Published
2024-07-12 12:25
Modified
2024-12-19 09:08
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation In case the firmware sends a notification that claims it has more data than it has, we will read past that was allocated for the notification. Remove the print of the buffer, we won't see it by default. If needed, we can see the content with tracing. This was reported by KFENCE.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154
Impacted products
Vendor Product Version
Linux Linux Version: 4.12
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:39:55.378Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-40941",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T17:04:27.174658Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:02.057Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/wireless/intel/iwlwifi/mvm/fw.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "15b37c6fab9d5e40ac399fa1c725118588ed649c",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            },
            {
              "lessThan": "6532f18e66b384b8d4b7e5c9caca042faaa9e8de",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            },
            {
              "lessThan": "46c59a25337049a2a230ce7f7c3b9f21d0aaaad7",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            },
            {
              "lessThan": "65686118845d427df27ee83a6ddd4885596b0805",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            },
            {
              "lessThan": "a8bc8276af9aeacabb773f0c267cfcdb847c6f2d",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            },
            {
              "lessThan": "a05018739a5e6b9dc112c95bd4c59904062c8940",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            },
            {
              "lessThan": "acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            },
            {
              "lessThan": "4bb95f4535489ed830cf9b34b0a891e384d1aee4",
              "status": "affected",
              "version": "bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/wireless/intel/iwlwifi/mvm/fw.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.12"
            },
            {
              "lessThan": "4.12",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.317",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.279",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.221",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.162",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.95",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.35",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won\u0027t see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:08:37.416Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c"
        },
        {
          "url": "https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de"
        },
        {
          "url": "https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7"
        },
        {
          "url": "https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805"
        },
        {
          "url": "https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d"
        },
        {
          "url": "https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940"
        },
        {
          "url": "https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154"
        },
        {
          "url": "https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4"
        }
      ],
      "title": "wifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-40941",
    "datePublished": "2024-07-12T12:25:16.471Z",
    "dateReserved": "2024-07-12T12:17:45.587Z",
    "dateUpdated": "2024-12-19T09:08:37.416Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-40941\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-12T13:15:16.440\",\"lastModified\":\"2024-11-21T09:31:54.967\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nwifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation\\n\\nIn case the firmware sends a notification that claims it has more data\\nthan it has, we will read past that was allocated for the notification.\\nRemove the print of the buffer, we won\u0027t see it by default. If needed,\\nwe can see the content with tracing.\\n\\nThis was reported by KFENCE.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: no leer m\u00e1s all\u00e1 de la notificaci\u00f3n mfuart En caso de que el firmware env\u00ede una notificaci\u00f3n que dice que tiene m\u00e1s datos de los que tiene, leeremos m\u00e1s all\u00e1 de los asignados para la notificaci\u00f3n. Elimina la impresi\u00f3n del b\u00fafer, no la veremos por defecto. Si es necesario, podemos ver el contenido con rastreo. As\u00ed lo inform\u00f3 KFENCE.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.